Answer: Option (a) ,(c) and (e) can become a solution for the problem.
Option(b) and (d) are not exactly a solution to the issue rather can be considered on temporary basis
Explanation: Windows Task Manager is used for processing task taking place in the system and monitors the performance of that task or program that is running.To stop the unnecessary program execution on the system. methods like searching the source of the program from Task scheduler, startup files or registry key that initiated the execution that unwanted task.
Methods like disabling the program by using Msconfig and Task manager will only deactivate them but they are not eliminated from the source .Thus the appropriate answers would be option(a), (c) and (e).
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution